Research in Brief

Total Page:16

File Type:pdf, Size:1020Kb

Research in Brief Center for Law & Human Behavior The University of Texas at El Paso Game Theory & Adversarial Reasoning Modeling Decisions as Games . 6 December 1, 2016 Research in Brief DHS SYMPOSIUM SERIES NO DHS SYMPOSIUMSERIES Center for Law & Human Behavior The University of Texas at El Paso 500 West University Avenue Prospect Hall, Room 226 El Paso, Texas 79968 Tel: (915) 747-5920 Email: [email protected] Website: http://clhb.utep.edu Follow us on Twitter @1CLHB The views and conclusions contained in this document are those of the authors and should not be interpreted as necessarily representing the official policies, either expressed or implied, of the U.S. Department of Homeland Security. This symposium is supported by the U.S. Department of Homeland Security, Science and Technology, Office of University Programs under Grant Award Number DHS-14-ST-061-COE-00. Abstract information, time and equilibrium. Game theory has been applied to many domains, such as biology and population evolution, Many decisions in homeland security and transportation, computer network, political law enforcement are fundamentally about sciences, health care, business and supply adversarial interactions between multiple chain, insurance, cybersecurity, and agents with opposing interests. We personal life and thinking. Game theory provide a broad overview of recent has also been studied extensively in research that seeks to develop better data analysis and modeling techniques to homeland security. provide decision support for complex One of the most common uses of game security decisions, such as how to optimally theory in homeland security is to optimize allocate security resources. We provide the allocation of security resources, such as simple examples to illustrate the basic deployments of officers, vehicle patrols, K9 concepts, and then discuss a number of units, or the use of screening methods examples of different applications of these during inspections (Tambe, 2011). The methods to a wide variety of problems in basic problem in these cases is that there the context of homeland security and law are limited resources that must be used as enforcement. We also highlight some of effectively as possible to increase security. our ongoing research to improve the For example, a limited number of units may fundamental methods to make them be assigned to patrol a large number of scalable and broadly applicable to new possible locations that may be the target of types of problems. Finally, we provide examples of how close collaboration with attacks or other illegal activity. end users and decision makers has led to One of the important aspects of allocating useful deployments of adversarial resources effectively in adversarial domains reasoning to solve real-world problems is unpredictability. Since we are facing an leading to increased effectiveness. intelligent, adaptive adversary who can learn about the security policy, it is not Introduction sufficient in most cases to use a static, predictable deployment strategy for Game theory is a branch of applied allocating security resources. Instead, we mathematics that is used in the social focus on finding optimal randomized sciences, most notably in economics. policies that keep the attacker guessing, Game theory is also used in biology, limiting the effectiveness of surveillance engineering, political science, international and increasing deterrence, while relations, computer science, and maintaining protection of the most critical philosophy. Game theory attempts to assets. mathematically capture behavior in strategic situations where an individual's It is also possible to model both strategic success in making choices depends on the attackers and random events (e.g., natural choices of others. The key components of a disasters or accidents) using this approach. game include: players, options/moves, For example, using attacker-defender sequence of moves, objectives/payoffs, games, Zhuang and Bier (2007) apply game theory to identify the attacker’s and ARMOR-K9 uses game theory to create defender’s equilibrium strategies, in the randomized schedules for the K9 patrols. resource allocation game to counter Again, optimizing the need for terrorism and natural disasters. Zhuang unpredictable schedules while taking into and Bier (2007) balance resource allocation account risk information about the between terrorism and natural disasters. different terminals and time periods. Instead of a discrete choice, this work considers the attacker’s choice using a The ARMOR system has been in continuous continuous level of effort. It is found that use at LAX since 2007, and has been viewed when the defensive investment increases, as a highly successful program in improving an attacker can either increase his level of the security of the airport. effort to compensate for the reduced probability or decrease his level since the IRIS: FAMS Scheduling attack becomes less profitable. Following the success of ARMOR, our team worked with the Federal Air Marshals ARMOR: LAX Security Service (FAMS) to develop a scheduling One of the first uses of game theory in a system for randomizing the flight major deployed decision support system scheduling for the air marshals using a for homeland security was the ARMOR similar game-theoretic approach system developed for the Los Angeles, CA (Kiekintveld, 2008). This system generates (LAX) airport (Pita, 2008). The ARMOR unpredictable flight schedules for a system uses game theory to find optimal specified number of FAMS teams. The schedules for two resource allocation system, again, takes into account risk problems at the airport. The first is the evaluations of the flights and airports to vehicle checkpoints problem. Checkpoints determine the optimal schedule. In are used to screen vehicles entering the addition, this system must account for a terminal areas of the airport. However, large number of complex scheduling there are several potential access points. constraints to generate a feasible schedule There are insufficient resources to man for the air marshals to fly. The complexity checkpoints on all inbound routes at all of the scheduling problem in combination times, so the checkpoints must be allocated with the scale of the resource allocation strategically. ARMOR-checkpoints utilizes problem, due to the massive number of game theory to randomly assign the possible flights and large number of air checkpoints, balancing the importance of marshals, required new breakthroughs in the different routes and terminals with the computational methods for security games need to be unpredictable. to be able to develop the software system, IRIS. The second problem is the K9 scheduling problem. There are a limited number of K9 After extensive evaluation by the research units available to patrol the LAX terminals, team and internal evaluation by FAMS, the so there is a similar problem with deciding IRIS system was initially deployed for where and when to schedule K9 patrols in scheduling international flights in 2009, the terminals using the limited resource. and use of the system has been expanded since that time. Ongoing research stage game is considered. In the context of continues to provide more advanced game terrorism, the attacker usually learns the models and software tools to support defender’s private information. Xu and scheduling (Tsai, 2009). Zhuang (2016) analyze the strategic interactions of the attacker’s learning and Modeling Secrecy and Deception the defender’s counter-learning. They find Different from natural disasters where the that the attacker’s best responses and the resource allocation is usually disclosed, in defender’s equilibrium deception and terrorism, attackers are adaptive, and the defense strategies are significantly investments are not always disclosed to the impacted by the attacker’s cost of learning. public. It is important and challenging for the government to understand when and Multi-Period Attacker-Defender how such investment should be disclosed. Games It is important and challenging to Zhuang and Bier (2010) study the understand how to defeat terrorist threats conditions when a defender should choose over time. We need to assess the terrorist’s secrecy or deception about the investments capacity to attack over time. Hausken and in a homeland-security context. In games Zhuang (2011) study the timing of attacks with no private defender information, and the terrorist’s option of stockpiling truthful disclosure is preferred to secrecy attack resources using a two-period game, and deception as long as the cost of where the attacker chooses whether or not implementing truthful disclosure is lower to stockpile resources from the first to the than the costs of secrecy and deception. In second period. Besides the terrorist’s games with private defender information, capacity to attack over time, how the secrecy and deception may be strictly attacks can be deterred as time passes is preferred by the defender at equilibrium, in another issue which is studied in Hausken order to mimic other types of defenders, and Zhuang (2012). Hausken and Zhuang even if the cost of implementing truthful (2012) develop a model to study the timing disclosure is lower than the costs of secrecy and deterrence of terrorist attacks in a T- and deception (Zhuang and Bier, 2010). period game where a two-stage game (the Zhuang et al. (2010) model defender defender moves first and the attacker secrecy and deception in a multiple-period moves second) is analyzed in each period. attacker-defender game.
Recommended publications
  • Chapter 12 Game Theory and Ppp*
    CHAPTER 12 GAME THEORY AND PPP* By S. Ping Ho Associate Professor, Dept. of Civil and Environmental Engineering, National Taiwan University. Email: [email protected] †Shimizu Visiting Associate Professor, Dept. of Civil and Environmental Engineering, Stanford University. 1. INTRODUCTION Game theory can be defined as “the study of mathematical models of conflict and cooperation between intelligent rational decision-makers” (Myerson, 1991). It can also be called “conflict analysis” or “interactive decision theory,” which can more accurately express the essence of the theory. Still, game theory is the most popular and accepted name. In PPPs, conflicts and strategic interactions between promoters and governments are very common and play a crucial role in the performance of PPP projects. Many difficult issues such as opportunisms, negotiations, competitive biddings, and partnerships have been challenging the wisdom of the PPP participants. Therefore, game theory is very appealing as an analytical framework to study the interaction and dynamics between the PPP participants and to suggest proper strategies for both governments and promoters. Game theory modelling method will be used throughout this chapter to analyze and build theories on some of the above challenging issues in PPPs. Through the game theory modelling, a specific problem of concern is abstracted to a level that can be analyzed without losing the critical components of the problem. Moreover, new insights or theories for the concerned problem are developed when the game models are solved. Whereas game theory modelling method has been broadly applied to study problems in economics and other disciplines, only until recently, this method has been * First Draft, To appear in The Routledge Companion to Public-Private Partnerships, Edited by Professor Piet de Vries and Mr.
    [Show full text]
  • Syllabus Game Thoery
    SYLLABUS GAME THEORY, PHD The lecture will take place from 11:00 am to 2:30 pm every course day. Here is a list with the lecture dates and rooms : 6.6. 11:00-14:30 SR 9 7.6. 11:00-14:30 SR 4 8.6. 11:00-14:30 SR 4 9.6. 11:00-14:30 SR 4 10.6. 11:00-14:30 SR 4 Midterm: Mo, 20.6. 10:00-12:00 Room TBA 20.6. 12:30-14:30 SR 9 21.6. 11:00-14:30 SR 4 22.6. 11:00-14:30 SR 4 23.6. 11:00-14:30 SR 4 24.6. 11:00-14:30 SR 4 Final: Fr, 8.7. 10:00-12:00 HS 2 Below you find an outline of the contents of the course. The slides to lectures 1-16 are attached. Our plan is to cover the contents of lectures 1 to 11 in week 1, and the contents of lectures 12 to 16 in week 2. If there is time left, there will be additional material (Lecture 17) on principal-agent theory. The lectures comprise four solution concepts, which is all what you need for applied research. *Nash Equilibrium (for static games with complete information) *Subgame Perfect Nash Equilibrium (for dynamic games with complete information) *Bayesian Nash Equilibrium (for static games with incomplete information) *Perfect Bayesian Nash Equilibrium (for dynamic games with incomplete information) Those who have some prior knowledge of game theory might wonder why Sequential Equilibrium (SE) is missing in this list.
    [Show full text]
  • Algorithmic Game Theory Lecture Notes
    Algorithmic Game Theory Lecture Notes Exarchal and lemony Pascal Americanized: which Clemmie is somnolent enough? Shelton is close-knit: she oversleeps agnatically and fog her inrushes. Christ is boustrophedon and unedges vernally while uxorious Raymond impanelled and mince. Up to now, therefore have considered only extensive form approach where agents move sequentially. See my last Twenty Lectures on Algorithmic Game Theory published by. Continuing the discussion of the weary of a head item, or revenue equivalence theorem, the revelation principle, Myersons optimal revenue auction. EECS 395495 Algorithmic Mechanism Design. Screening game theory lecture notes games, algorithmic game theory! CSC304 Algorithmic Game Theory and Mechanism Design Home must Fall. And what it means in play world game rationally form games with simultaneous and the syllabus lecture. Be views as pdf game theory lecture. Book boss course stupid is Algorithmic Game Theory which is freely available online. And recently mailed them onto me correcting many errors as pdf files my son Twenty on! Course excellent for Algorithmic Game Theory Monsoon 2015. Below is a loft of related courses at other schools. Link to Stanford professor Tim Roughgarden's video lectures on algorithmic game theory AGT 2013 Iteration. It includes supplementary notes, algorithms is expected to prepare the lectures game theory. Basic Game Theory Chapter 1 Lecture notes from Stanford. It is a project instead, you sure you must save my great thanks go to ask questions on. Resources by type ppt This mean is an introduction game! Game Theory Net Many Resources on Game Theory Lecture notes pointers to literature. Make an algorithmic theory lecture notes ppt of algorithms, formal microeconomic papers and.
    [Show full text]
  • Uncertainty and Information
    8 ■ Uncertainty and Information N CHAPTER 2, we mentioned different ways in which uncertainty can arise in a game (external and strategic) and ways in which players can have lim- ited information about aspects of the game (imperfect and incomplete, symmetric and asymmetric). We have already encountered and analyzed Isome of these. Most notably, in simultaneous-move games, each player does not know the actions the other is taking; this is strategic uncertainty. In Chapter 6, we saw that strategic uncertainty gives rise to asymmetric and imperfect infor- mation, because the different actions taken by one player must be lumped into one infor mation set for the other player. In Chapters 4 and 7, we saw how such strategic uncertainty is handled by having each player formulate beliefs about the other’s action (including beliefs about the probabilities with which differ- ent actions may be taken when mixed strategies are played) and by applying the concept of Nash equilibrium, in which such beliefs are confirmed. In this chap- ter we focus on some further ways in which uncertainty and informational limi- tations arise in games. We begin by examining various strategies that individuals and societies can use for coping with the imperfect information generated by external uncertainty or risk. Recall that external uncertainty is about matters outside any player’s con- trol but affecting the payoffs of the game; weather is a simple example. Here we show the basic ideas behind diversification, or spreading, of risk by an individual player and pooling of risk by multiple players. These strategies can benefit every- one, although the division of total gains among the participants can be unequal; therefore, these situations contain a mixture of common interest and conflict.
    [Show full text]
  • Sequential Screening with Positive Selection∗
    From Bottom of the Barrel to Cream of the Crop: Sequential Screening with Positive Selection∗ Jean Tirole† June 15, 2015 Abstract In a number of interesting environments, dynamic screening involves positive selection: in contrast with Coasian dynamics, only the most motivated remain over time. The paper provides conditions under which the principal’s commitment optimum is time consistent and uses this result to derive testable predictions under permanent or transient shocks. It also identifies environments in which time consistency does not hold despite positive selection, and yet simple equilibrium characterizations can be obtained. Keywords: repeated relationships, screening, positive selection, time consistency, shifting preferences, exit games. JEL numbers: D82, C72, D42 1 Introduction The poll tax on non-Muslims that was levied from the Islamic conquest of then-Copt Egypt in 640 through 1856 led to the (irreversible) conversion of poor and least religious Copts to Islam to avoid the tax and to the shrinking of Copts to a better-off minority. To the reader familiar with Coasian dynamics, the fact that most conversions occurred during the first two centuries raises the question of why Muslims did not raise the poll tax over time to reflect the increasing average wealth and religiosity of the remaining Copt population.1 This paper studies a new and simple class of dynamic screening games. In the standard intertemporal price discrimination (private values) model that has been the object of a volumi- nous literature, the monopolist moves down the demand curve: most eager customers buy or consume first, resulting in a right-truncated distribution of valuations or “negative selection”.
    [Show full text]
  • Lecture Notes for Economics 200Cb: Games and Information Segment Vincent Crawford Spring 2009 Revised 26 May 2009
    Lecture Notes for Economics 200Cb: Games and Information Segment Vincent Crawford Spring 2009 Revised 26 May 2009 1. Adverse Selection (MWG 436-450; Kreps 625-629; Varian 466-469) Competitive labor market with many identical, expected profit-maximizing firms. Many workers with privately observed ability θ (measured as output) distributed on a compact interval with c.d.f. F( θ) and reservation ("home") wage r( θ). Full-information efficient benchmark outcome has each worker working iff r( θ) ≤ θ, each paid his θ. Inefficient equilibrium with r( θ) ≡ r (home wage independent of ability): If w ≥ r all accept employment; if w < r none do; either way equilibrium wage w* = Eθ. Whether w* > or < r is determined by proportions of high- and low-ability workers: If too many lows, firms unwilling to pay wage any will accept, too little employment (some workers with θ > r unemployed). If too many highs, firms pay wage that all will accept, too much employment (some workers with θ < r employed in equilibrium). Asymmetric information prevents firms from paying each worker his marginal product, and thus prevents market from allocating workers efficiently between work and home. 1 When r( θ) varies with θ, adverse selection can cause market failure. Figure 13.B.1-2 at MWG 441-442. Suppose that r( θ) < θ for all θ, so efficiency requires all workers to work; that r( θ) is strictly increasing; and that there is a density of abilities θ, privately known. Then at any given wage only the less able (r( θ) ≤ w) will work, so that lower wage rates lower (via adverse selection) the average productivity of those who accept employment.
    [Show full text]
  • Job-Market Signaling and Screening: an Experimental Comparison
    Games and Economic Behavior 64 (2008) 219–236 www.elsevier.com/locate/geb Job-market signaling and screening: An experimental comparison Dorothea Kübler a,b,∗, Wieland Müller c,d, Hans-Theo Normann e a Faculty of Economics and Management, Technical University Berlin, H 50, Straße des 17 Juni 135, 10623 Berlin, Germany b IZA, Germany c Department of Economics, Tilburg University, Postbus 90153, 5000LE Tilburg, The Netherlands d TILEC, The Netherlands e Department of Economics, Royal Holloway College, University of London, Egham, Surrey, TW20, OEX, UK Received 6 October 2005 Available online 16 January 2008 Abstract We analyze the Spence education game in experimental markets. We compare a signaling and a screening variant, and we analyze the effect of increasing the number of competing employers from two to three. In all treatments, efficient workers invest more often in education and employers pay higher wages to workers who have invested. However, separation of workers is incomplete and wages do not converge to equilibrium levels. In the signaling treatment, we observe significantly more separating outcomes compared to the screening treatment. Increasing the number of employers leads to higher wages in the signaling sessions but not in the screening sessions. © 2008 Elsevier Inc. All rights reserved. JEL classification: C72; C73; C91; D82 Keywords: Job-market signaling; Job-market screening; Sorting; Bayesian games; Experiments * Corresponding author. E-mail addresses: [email protected] (D. Kübler), [email protected] (W. Müller), [email protected] (H.-T. Normann). 0899-8256/$ – see front matter © 2008 Elsevier Inc. All rights reserved. doi:10.1016/j.geb.2007.10.010 220 D.
    [Show full text]
  • Job Market Signaling and Screening: an Experimental Comparison
    IZA DP No. 1794 Job Market Signaling and Screening: An Experimental Comparison Dorothea Kübler Wieland Müller Hans-Theo Normann DISCUSSION PAPER SERIES DISCUSSION PAPER October 2005 Forschungsinstitut zur Zukunft der Arbeit Institute for the Study of Labor Job Market Signaling and Screening: An Experimental Comparison Dorothea Kübler Technical University Berlin and IZA Bonn Wieland Müller Tilburg University Hans-Theo Normann Royal Holloway, University of London Discussion Paper No. 1794 October 2005 IZA P.O. Box 7240 53072 Bonn Germany Phone: +49-228-3894-0 Fax: +49-228-3894-180 Email: [email protected] Any opinions expressed here are those of the author(s) and not those of the institute. Research disseminated by IZA may include views on policy, but the institute itself takes no institutional policy positions. The Institute for the Study of Labor (IZA) in Bonn is a local and virtual international research center and a place of communication between science, politics and business. IZA is an independent nonprofit company supported by Deutsche Post World Net. The center is associated with the University of Bonn and offers a stimulating research environment through its research networks, research support, and visitors and doctoral programs. IZA engages in (i) original and internationally competitive research in all fields of labor economics, (ii) development of policy concepts, and (iii) dissemination of research results and concepts to the interested public. IZA Discussion Papers often represent preliminary work and are circulated to encourage discussion. Citation of such a paper should account for its provisional character. A revised version may be available directly from the author. IZA Discussion Paper No.
    [Show full text]
  • Game Theory in Business Collaboration
    Game Theory in Business Collaboration Ting Hei Gabriel Tsang Department of Computing Macquarie University Sydney, Australia [email protected] Abstract and their privileges. Given a request to access a resource or perform an operation, the service en- Game Theory has been studied in several areas forces the policy by analysing the credentials of such as Mathematics and Economics and it the requester and deciding if the requester is au- helps to choose a better strategy to maximise thorised to perform the actions in the request their profit or improve their quality. However, B2B integration is basically about the secured it does not have many studies about applying coordination of information among businesses game theory to business collaboration. In this paper, we take negotiation of access control and their information systems. It promises to policy between organizations as one of the dramatically transform the way business is con- business collaboration challenges and apply ducted among organisations. Negotiation of game theory creatively on Business Collabora- common access to a set of resources reflects the tion aspect for decision making in terms of sharing preferences of the parties involved. Such improving performance. negotiations typically seek agreement on a set of access properties. The approach of this project would be making Game Theory has been an important theory in our assumption about the business collabora- several areas such as Mathematics, Economics tion first and then analyse the game theory and Philosophy because Game theoretic concepts characteristics. Then, we compare the business apply whenever the actions of any individuals, challenge to the game theory characteristics to form the result.
    [Show full text]
  • Game Theory and Economic Modelling
    Game Theory and Economic Modelling Kreps, David M Paul E. Holden Professor of Economics, Graduate School of Business , Stanford University Contents 1. Introduction 2. The standard 3. Basic notions of non-cooperative game theory Strategic form games Extensive form games Extensive and strategic form games Dominance Nash equilibrium 4. The successes of game theory Taxonomy based on the strategic form Dynamics and extensive form games Incredible threats and incredible promises Credible threats and promises: Co-operation and reputation The importance of what players know about others Interactions among parties holding private information Concluding remarks 5. The problems of game theory The need for precise protocols Too many equilibria and no way to choose Choosing among equilibria with refinements The rules of the game 1 6. Bounded rationality and retrospection Why study Nash equilibria? The case for bounded rationality and retrospection A line of attack Historical antecedents and recent examples Objections to this general approach, with rebuttals Similarities: Or, Deduction and prospection is bounded rationality and retrospection The other problems of game theory Final words Bibliography Index 2 Acknowledgements This book provides a lengthened account of a series of lectures given at the Tel Aviv University under the aegis of the Sackler Institute for Advanced Studies and the Department of Economics in January 1990 and then at Oxford University in the Clarendon Lecture Series while I was a guest of St Catherine's College in February 1990. (Chapter 3 contains material not given in the lecture series that is useful for readers not conversant with the basic notions of non-cooperative game theory.) I am grateful to both sets of institutions for their hospitality in the event and for their financial support.
    [Show full text]
  • Signalling and Screening
    Signalling And Screening (to appear in the New Palgrave Dictionary of Economics, 2nd Ed.) Johannes Hörner June 12, 2006 Signalling refers to any activity by a party whose purpose is to in‡uence the perception and thereby the actions of other parties. This presupposes that one market participant holds private information that for some reason cannot be veri…ably disclosed, and which a¤ects the other participants’ incentives. Excellent surveys include Kreps and Sobel (1994) and Riley (2001). The classic example of market signalling is due to Spence (1973, 1974). Consider a labor market in which …rms know less than workers about their innate productivity. Under certain conditions, some workers may wish to signal their ability to potential employers, and do so by choosing a level of education that distinguish themselves from workers with lower productivity. 1. Mathematical Formulation: We consider here the simplest game-theoretic version of Spence’s model. A worker’s productivity, or type, is either H or L, with H > L > 0. Productivity is private information. Firms share a common prior p, with p = Pr = H f g 2 (0; 1). Before entering the job market, the worker chooses a costly education level e 0. (The reader is referred to Krishna and Morgan, this volume, for the case of costless signals.) Workers maximize U (w; e; ) = w c (e; ), where w is their wage and c (e; ) is the cost of education. Assume that c (0; ) = 0, ce (e; ) > 0, cee (e; ) > 0, c (e; ) < 0 for all e > 0, where ce ( ; ) and c (e; ) denote the derivatives of the cost with respect to education and types, respectively, and 1 cee ( ; ) is the second derivative of cost with respect to education.
    [Show full text]
  • MS&E 246: Lecture 16 Signaling Games
    MS&E 246: Lecture 16 Signaling games Ramesh Johari Signaling games Signaling games are two-stage games where: • Player 1 (with private information) moves first. His move is observed by Player 2. • Player 2 (with no knowledge of Player 1’s private information) moves second. • Then payoffs are realized. Dynamic games Signaling games are a key example of dynamic games of incomplete information. (i.e., a dynamic game where the entire structure is not common knowledge) Signaling games The formal description: Stage 0: Nature chooses a random variable t1, observable only to Player 1, from a distribution P(t1). Signaling games The formal description: Stage 1: Player 1 chooses an action a1 from the set A1. Player 2 observes this choice of action. (The action of Player 1 is also called a “message.”) Signaling games The formal description: Stage 2: Player 2 chooses an action a2 from the set A2. Following Stage 2, payoffs are realized: Π1(a1, a2 ; t1) ; Π2(a1, a2 ; t1). Signaling games Observations: • The modeling approach follows Harsanyi’s method for static Bayesian games. • Note that Player 2’s payoff depends on the type of player 1! • When Player 2 moves first, and Player 1 moves second, it is called a screening game. Application 1: Labor markets A key application due to Spence (1973): Player 1: worker t1 : intrinsic ability a1 : education decision Player 2: firm(s) a2 : wage offered Payoffs: Π1 = net benefit Π2 = productivity Application 2: Online auctions Player 1: seller t1 : true quality of the good a1 : advertised quality Player 2: buyer(s)
    [Show full text]